Skip to main content
. 2016 Mar 15;8(3):1560–1580.

Table 4.

Bluetooth security tactics for researchers

● Disable Bluetooth when not in use. Consider disabling Bluetooth devices in closed environments such as aboard a commercial aircraft.
● Disable unused services, like enable the wireless headset but disable file transfer.
● Place Bluetooth device in non-discoverable mode when not pairing with another device.
● Never accept files or messages over Bluetooth from untrusted devices, use a second factor of verification before accepting a connection.
● Never accept pairing from untrusted or unknown devices. Pairing is permanent until deleted and pairing with an unknown device can provide access to all the services enabled on the mobile device.
● Change PINs semi-frequently by un-pairing the devices, changing the PIN, and re-pairing.
● Use a secondary form of authentication for access to apps, such as a username and password or PIN.
● Be careful about Bluetooth pairings when on the go. Pairing a smartphone to a rental car may leave data behind after the connection is terminated.